Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Obscuring Mobile Agents by Source Code Obfuscation

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 61 - Number 9
Year of Publication: 2013
Authors:
Veena Garg
Atul Srivastava
Atul Mishra
10.5120/9960-4925

Veena Garg, Atul Srivastava and Atul Mishra. Article: Obscuring Mobile Agents by Source Code Obfuscation. International Journal of Computer Applications 61(9):46-50, January 2013. Full text available. BibTeX

@article{key:article,
	author = {Veena Garg and Atul Srivastava and Atul Mishra},
	title = {Article: Obscuring Mobile Agents by Source Code Obfuscation},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {61},
	number = {9},
	pages = {46-50},
	month = {January},
	note = {Full text available}
}

Abstract

Security and performance are most essential and prime challenges for networking phenomenon. Computation on the remote host is generally done through links. Thus security is needed when the code is on the way to the destination host. A program travelling over the link is extremely venerable to be forged for malfunctioning. On the other hand Software's are commonly distributed with all information in the code itself, for example java byte codes. Byte codes are easy to reverse engineer. Any rival company may get the algorithms and techniques used in the product. Therefore a protection is needed to keep information secret. In both the cases obfuscation seem to be promising solution to the problem. Obfuscation makes code less understandable without changing its functionality. In this paper we have proposed an obfuscator that converts source code of a mobile agent into unintelligible code. Whole paper mainly focuses on obfuscating mobile agents whereas the technique can be used for any software obfuscation.

References

  • Hohl, F. A Framework to Protect Mobile Agents by Using Reference States:Technical Report Nr. 2000/03, Universitt Stuttgart, 2000.
  • Farmer, W. , Guttman, J. , and Swarup V. Security for Mobile agents Authentication and State Appraisal. Fourth European Symposium on Research in Computer Security, pages 118-130, 1996.
  • W. Jansen and T. Karygiannis. NIST special publication 800-19 – mobile agent security, 2000, National Institute of Standards Technology.
  • Sander, T. , and Tschudin, C. F. Protecting Mobile Agents Against Malicious Hosts. Vigna G. (Ed. ) Mobile Agents and Security. Springer-Verlag, 1997.
  • Riordan, J. , and Schneier, B. Environmental Key Generation Towards Clueless Agents. Vigna, G. (Ed. ), Mobile Agents and Security, Springer-Verlag, 1998.
  • Vigna, G. Cryptographic Traces for Mobile Agents. In Vigna, G. (Ed. ): Mobile Agents and Security, pages 137-153, Springer-Verlag, 1998.
  • Xudong Guan, Yiling Yang, Jinyuan You POM - A Mobile Agent Security Model against Malicious Hosts, Dept. of Computer Sci. & Eng. , Shanghai Jiaotong University, 200030, China.
  • C. Collberg, C. Thomborson, and D. Low "A taxonomy of obfuscating transformations", Technical Report 148,Department of Computer Science, University of Auckla, July 1997.
  • Sandhya Armoogum and Asvin Caully "Obfuscation Techniques for Mobile Agent code confidentiality", March 2010.
  • Arini Balakrishnan, Chloe Schulze "Code Obfuscation Literature Survey" , December 19th, 2005.
  • David Beasley, David R. Bull, Ralph R. Martin "An Overview of Genetic Algorithms: Part 2, Research Topics", University Computing,1993.
  • S. Praveen and P. SojanLal "Array based java source code obfuscation using classes with restructured arrays", 2008.
  • Andrej Brodnik, Milena Kova?, ?Spela Malovrh "Optimal representation of sparse matrices, University of Ljubljana,1999.
  • S. Rugaber, K. Stirewalt, and L. Wills, "The Interleaving Problem in Program Understanding," 2nd Working Conference on Reverse Engineering, Toronto, Ontario, Canada, pp. 166-175, July 14-16 1995.
Learn about the IJCA article correction policy and process
Dealing with any form of infringement.
‘Peer Review – A Critical Inquiry’ by David Shatz
Directly place requests for print/ hard copies of IJCA via Google Docs